{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:21Z","timestamp":1750306401274,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Greek national resources"},{"name":"European Union (Social Fund)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1145\/2801948.2801973","type":"proceedings-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T12:31:10Z","timestamp":1442925070000},"page":"261-266","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Cognitive channel selection for opportunistic spectrum access"],"prefix":"10.1145","author":[{"given":"Angeliki","family":"Kordali","sequence":"first","affiliation":[{"name":"National Technical University of Athens, Greece"}]},{"given":"Panayotis G.","family":"Cottis","sequence":"additional","affiliation":[{"name":"National Technical University of Athens, Greece"}]}],"member":"320","published-online":{"date-parts":[[2015,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.05.001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090109"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481338"},{"volume-title":"A Comprehensive Survey,\" IEEE Communications Surveys & Tutorials","author":"Tragos E. Z.","key":"e_1_3_2_1_5_1","unstructured":"E. Z. Tragos , S. Zeadally , A. G. Fragkiadakis , V. A. Siris , \" Spectrum Assignment on Cognitive Radio Networks : A Comprehensive Survey,\" IEEE Communications Surveys & Tutorials , Vol. 15 , No. 3, 2013. E. Z. Tragos, S. Zeadally, A. G. Fragkiadakis, V. A. Siris, \"Spectrum Assignment on Cognitive Radio Networks: A Comprehensive Survey,\" IEEE Communications Surveys & Tutorials, Vol. 15, No. 3, 2013."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0906-x"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2009.071363"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2014460"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110402"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.131123"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2009.6391385"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2065031"},{"issue":"4","key":"e_1_3_2_1_13_1","article-title":"Performance Analysis of Selective Opportunistic Spectrum Access With traffic Prediction","volume":"59","author":"Yun G.","year":"2010","unstructured":"G. Yun , R. C. Grammenos , Y. Yang , and W. Wang , \" Performance Analysis of Selective Opportunistic Spectrum Access With traffic Prediction ,\" IEEE Transactions on Vehicular Technology , Vol. 59 , No. 4 , 2010 . G. Yun, R. C. Grammenos, Y. Yang, and W. Wang, \"Performance Analysis of Selective Opportunistic Spectrum Access With traffic Prediction,\" IEEE Transactions on Vehicular Technology, Vol. 59, No.4, 2010.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"R. S. Sutton A.G. Barto \"Reinforcement Learning \" MIT Press Cambridge MA 1998.   R. S. Sutton A.G. Barto \"Reinforcement Learning \" MIT Press Cambridge MA 1998.","DOI":"10.1109\/TNN.1998.712192"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992698"}],"event":{"name":"PCI '15: 19th Panhellenic Conference on Informatics","acronym":"PCI '15","location":"Athens Greece"},"container-title":["Proceedings of the 19th Panhellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801948.2801973","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2801948.2801973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:28Z","timestamp":1750223248000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801948.2801973"}},"subtitle":["a reinforcement-learning approach"],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":15,"alternative-id":["10.1145\/2801948.2801973","10.1145\/2801948"],"URL":"https:\/\/doi.org\/10.1145\/2801948.2801973","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]},"assertion":[{"value":"2015-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}